• 제목/요약/키워드: Violation

검색결과 858건 처리시간 0.03초

현대 복식에 나타난 "외부로부터의 해체"현상(제1보) -1980년대부터 1990년대를 중심으로- (Deconstruction' From The Outside Expressed In the Contemporary Costume (Part I) -From 1980's to 1990's-)

  • 김주영;양숙희
    • 한국의류학회지
    • /
    • 제21권8호
    • /
    • pp.1261-1274
    • /
    • 1997
  • Contemporary costume by the 'Deconstruction' from the outside has shown disclosure, destruction, poverty and analysis. The conclusion of this thesis as follows, 1. The Deconstruction of disclosure by infra disclosed the underwear and inner structure outside, which has deconstructed a fixed idea i.e.'underwear must be in outwear', modesty versus immodesty and disclosure versus concealment. 2. The Deconstruction of destruction originated in punk look has rejected traditional manners and utility, at the same time, it has shown the ambivalence i.e. completeness versus incompleteness, making versus destructing by slashes, rips, fringes. 3. The Deconstruction of poverty has appeared as French avangarde mode, little black dress by Chanel, second hand style by hippy, blue jean, granny look, especially Rei Kawakubo's poor look influenced by Zen Aesthetics and post punk. It has looked like old and worn out dress by doing patchwork, dye, decolor, rip, fray, which has shown the decentring by concealing the body than disclosing, rejecting snobbery. 4. The Deconstruction of analysis, seemingly partial and patched is a violation only of our expectation of clothing's unbroken entity though it has looked like a fragment. The completeness and coherence of it is made more evident by its breach, void, and bond like a poetic language. As the result, disclosed, destructed, poor, and analytical costumes has expressed as an escape from the appearance which traditional aesthetic concept had pursued.

  • PDF

분산시스템 환경에서 관리 객체에 대한 역할기반 접근제어 모델 (A Role-Based Access Control Model of Managed Objects in Distributed System Environments)

  • 최은복
    • 인터넷정보학회논문지
    • /
    • 제4권1호
    • /
    • pp.75-86
    • /
    • 2003
  • 본 논문에서는 역할기반 접근제어 정책을 지원할 수 있도록 관리객체 클래스 계층구조를 확장하였다. 또한, 관리 프로세스에 의해 설정되어지는 접근제어 규칙을 정적인 시간속성 외에 관리 정보에 대한 접근 권한을 수행하는 동적인 시간지원 기능을 갖는 선행조건에 관련된 제약사항 그리고 제약사항에 위배되었을 경우 관리자에게 보고되어야 할 위반 통지에 대해 기술하였다. 그리고 망관리 정보베이스에 대해 동적 시간지원 제약사항과 역할기반 접근제어 정책을 지원하는 시스템 구조를 제시하였다. 이 시스템에서는 BDL에 기반하여 접근제어의 집행과 결정함수에 관련된 모듈과 제약사항 그리고 각 역할들의 활성화 전이과정을 기술하므로써 동적 특성을 체계적이고 명확하게 표현하였다.

  • PDF

양성 성대 병변의 비수술적 치료 (Non-Surgical Management for Benign Vocal Fold Lesions)

  • 이상혁
    • 대한후두음성언어의학회지
    • /
    • 제26권2호
    • /
    • pp.97-100
    • /
    • 2015
  • Benign vocal fold lesions, such as vocal nodules, polyps and Reinke's edema, usually result from chronic voice overuse. Conservative management such as voice therapy and pharmacotherapy are used as the primary treatment techniques. The main purpose of voice therapy is to identify and reduce voice misuse to achieve the optimal voice. But complete resolution may not be possible in all patients after voice therapy. Furthermore, some patients with voice-related occupations, voice rest and voice therapy are sometimes difficult, which makes it hard to carry out the treatment. When conservative therapy is ineffective, laryngeal microsurgery can be performed under general anesthesia. However, potential complications following laryngeal suspension and violation of the layered structure of the vocal fold during surgery should be considered before surgery. In recent decades, emerging literatures have demonstrated the potential usefulness of vocal fold steroid injection as an alternative treatment option for benign vocal fold lesions. The most advantageous feature of vocal fold steroid injection is the maintenance of regional anti-inflammatory effects while preventing the potential systemic adverse effects of the steroid. Many non-surgical treatment methods can be conducted using different approaches in the office setting. It can be applied as an alternative treatment modality for the management of various benign vocal fold lesions.

  • PDF

차량 네트워크 통신용 보안 모듈 (A Security Module for Vehicle Network Communication)

  • 권병헌;박진성
    • 디지털콘텐츠학회 논문지
    • /
    • 제8권3호
    • /
    • pp.371-376
    • /
    • 2007
  • 차량 내부에서는 컨트롤러, 센서, 텔레매틱스 단말기, 내비게이션, 오디오 및 비디오 등 다양한 모듈들이 CAN이나 MOST와 같은 차량 네트워크를 통해 연결되어 있다. 게다가, 사용자는 이동 중에 무선 모바일 네트워크를 이용하여 ITS나 인터넷에 접속할 수도 있다. 이러한 네트워크의 다양한 활용은 데이터 해킹, 프라이버시 침해, 위치 추적 등과 같은 많은 보안 문제를 야기하게 된다. 또한, 차량 운영 데이터(센서, 제어 데이터)를 해킹함으로써 차량을 고장 내거나 사고를 유발할 수 있는 가능성도 점차 커지고 있다. 본 논문에서는 CAN이나 MOST와 같은 차량 네트워크에 적용할 수 있는 암호화 기능을 가지는 보안 모듈을 제안한다. 이 보안 모듈은 DES, 3-DES, SEED, ECC 및 RSA와 같은 일반적인 암호화 알고리듬과 전자서명 기능을 제공하게 된다.

  • PDF

폭소노미 기반 개인화 웹 검색 시스템 (Folksonomy-based Personalized Web Search System)

  • 김동욱;강수용;김한준;이병정
    • 디지털콘텐츠학회 논문지
    • /
    • 제11권1호
    • /
    • pp.105-115
    • /
    • 2010
  • 검색엔진들은 사용자로부터 질의어를 전송받아 질의어와 관련이 가장 높은 웹 문서들을 보여주게 된다. 하지만 검색엔진이 사용자의 질의어만 가지고 사용자의 의도를 파악하여 정확한 웹 문서를 제공하기는 어렵다. 따라서 검식 엔진 시스템은 다양한 개인화 방법을 사용하여 각 사용자가 원하는 검색 결과를 보여주기 위해 노력한다. 본 논문에서는 개인화 검색을 위해 '폭소노미'를 기반으로 사용자에게 적합한 질의어를 추천해 주는 방법을 제안한다. 또한 이러한 개인화된 검색 결과를 제공하는 시스템이 가질 수 있는 프라이버시 침해 위험성을 제거하면서도 검색 서비스 제공자 입장에서는 사용자 정보를 활용한 다양한 서비스(개인화 광고등) 제공이 가능하도록 하는 개인화 검색 서비스 구조를 제안한다.

국제투자에 있어서 간접수용에 관한 연구 - 간접수용의 요건을 중심으로 - (A Study on the Indirect Expropriation in International Investment - Focused on the Requirements of Indirect Expropriation -)

  • 김용일;이기옥;이경화
    • 무역상무연구
    • /
    • 제47권
    • /
    • pp.3-24
    • /
    • 2010
  • The contours of the definition of an indirect expropriation are not precisely drawn. In some recent ICSID decision, tribunals have interpreted the concept of indirect expropriation narrowly and have preferred to find a violation of the standard of fair and equitable treatment. Thus, I analyzed the three Requirements of Indirect Expropriation basis of ICSID Cases as below. First, the effect of measure upon the economic benefit value as well as upon the control over the investment will be the key question when it comes to deciding whether an indirect expropriation has taken place. Whenever this effect is substantial and lasts for a significant period of time, it will be assumed prima facie that a taking of the property has occurred. Second, legitimate play a key role in the interpretation of the fair and equitable treatment standard. But they also found entry into the law governing indirect expropriation. Finally, the duration of a government measure affecting the interests of a foreign investor is important for the assessment of whether an expropriation has occurred.

  • PDF

무선랜에서의 실시간 및 비실시간 트래픽 스케줄링 (Scheduling of Real-time and Nonreal-time Traffics in IEEE 802.11 Wireless LAN)

  • Lee, Ju-Hee;Lee, Chae Y.
    • 한국경영과학회지
    • /
    • 제28권2호
    • /
    • pp.75-89
    • /
    • 2003
  • Media Access Control (MAC) Protocol in IEEE 802.11 Wireless LAN standard supports two types of services, synchronous and asynchronous. Synchronous real-time traffic is served by Point Coordination Function (PCF) that implements polling access method. Asynchronous nonreal-time traffic is provided by Distributed Coordination Function (DCF) based on Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) protocol. Since real-time traffic is sensitive to delay, and nonreal-time traffic to error and throughput, proper traffic scheduling algorithm needs to be designed. But it is known that the standard IEEE 802.11 scheme is insufficient to serve real-time traffic. In this paper, real-time traffic scheduling and admission control algorithm is proposed. To satisfy the deadline violation probability of the real time traffic the downlink traffic is scheduled before the uplink by Earliest Due Date (EDD) rule. Admission of real-time connection is controlled to satisfy the minimum throughput of nonreal-time traffic which is estimated by exponential smoothing. Simulation is performed to have proper system capacity that satisfies the Quality of Service (QoS) requirement. Tradeoff between real-time and nonreal-time stations is demonstrated. The admission control and the EDD with downlink-first scheduling are illustrated to be effective for the real-time traffic in the wireless LAN.

Needs for Changing Accident Investigation from Blaming to Systems Approach

  • Kee, Dohyung
    • 대한인간공학회지
    • /
    • 제35권3호
    • /
    • pp.143-153
    • /
    • 2016
  • Objective: The purposes of this study are to survey needs for changing accident investigation from blaming to systems approach and to briefly summarize systems-based accident analysis techniques. Background: In modern complex socio-technical systems, accidents are caused by a variety of contributing factors including human, technical, organizational, social factors, not by just a single violation or error of a specific actor, but accidents investigation used to be focused on the incorrect action of individuals. A new approach investigating causes of accidents as a symptom of a deficient system is required. Method: This study was mainly based on survey of literatures related to accidents, accidents investigation, which included academic journals, newspapers, etc. Results: This study showed that accidents investigation of Korea focusing on blaming is problematic. This was confirmed by two concepts of migration and hindsight bias frequently found in accident causation studies, and an attribute of accidents having varying causes. This was illustrated with an example of Sewol ferry capsizing accident. Representative systems-based accident analysis models including Swiss cheese model, AcciMap, HFACS, FRAM and STAMP were briefly introduced, which can be used in systematic accidents investigations. Finally, this study proposed a procedure for establishing preventive measures of accidents, which was composed of two steps: public inquiry and devising preventive measures. Conclusion: A new approach considering how safety-critical components such as technical and social elements, and their interactions lead to accidents is needed for preventing reoccurrence of similar accidents in complex socio-technical systems. Application: The results would be used as a reference or guideline when the safety relevant governmental organizations investigate accidents.

방문간호사가 경험하는 폭력의 특성과 예방대책 (Violence Victimization of Visiting Nurses and Prevention Strategies Adopted by Public Institutions in Korea)

  • 김희걸;남혜경
    • 가정간호학회지
    • /
    • 제24권3호
    • /
    • pp.243-254
    • /
    • 2017
  • Purpose: This study aims to reveal violence victimization of visiting nurses and investigate the coping and prevention strategies adopted by public institutions. Method: The data were collected over three weeks in 2017 using self-report questionnaires from 237 visiting nurses. Data were collected between August 23 and September 15, 2017. Result: Among the respondents, 74.7% had experienced some types of work-related violence during the past year. Verbal abuse (65.4%) was most common, followed by physical threat (46.8%), sexual abuse (43.9%), and physical violence (5.5%). The nurses perceived the most common cause of violation as socio-economic frustration of the offenders vented out on the nurses. Besides, most reported offenders had mental health problems. The two most effective measures to prevent violence faced by the nurses are terminating visiting services for the offenders and implementing the buddy system, which has rarely been used in practice. Conclusion: These findings show that visiting nurses are exposed to a risk of serious abuse in everyday work life, and the nurses themselves or institutions have failed to handle the violence, showing shaky responses at best. Therefore, it is necessary to establish internal regulations and systems at the institutional level that can help prevent violence against visiting nurses.

고령화 수준별 교통사고 심각성 분석 (Analysis of Traffic Accident Severity by Aging Level)

  • 김태양;박병호
    • 한국안전학회지
    • /
    • 제33권4호
    • /
    • pp.105-110
    • /
    • 2018
  • Korea has entered to 'aged society', which the elderly people over 65 years old is over 14% of total population. This paper aims to analyze the traffic accident by aging level. In pursuing the above, this paper focuses on modeling the traffic accident severity based on three aging levels. The main results are as follows. First, the ratio of fatal and serious injured persons (FSI) is judged to increase according to increasing aging level. Second, the null hypothesis that there is no difference in FSI among three aging levels (aging, aged, and super-aged) is rejected. Four accident severity generalized linear models which are all statistically significant have been developed. Third, the common variables are analyzed to be median age, the number of hospital beds per persons, and turn signal usage ratio. Fourth, the differentiated traffic safety policies fitted to aging levels are required. The enforcement of traffic law violation and safety enhancement of motorcycle in the region of 'aging society', improvement of traffic facilities in the region of 'aged society', and expansion of transportation facilities in the region of 'super-aged society' are evaluated to be indispensable.